<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Self- Signed Certificate - Change RSA Public Key  &amp; Signature Algorithim in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/self-signed-certificate-change-rsa-public-key-signature/m-p/2581551#M920549</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My 1801 router (IOS 15x) is using the original self signed certificate (1024) with an signature algorithm MD5. I would like to change the cert to a 2048 key length , with a hash of SHA1 or better but I'm unsure how to do this.&lt;/P&gt;&lt;P&gt;Should I just generate new keys or would I be better creating a new self-signed cert?&amp;nbsp; What is the procedure &amp;amp; explicit commands (CLI) to do this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 13:20:03 GMT</pubDate>
    <dc:creator>ms4561</dc:creator>
    <dc:date>2020-02-21T13:20:03Z</dc:date>
    <item>
      <title>Self- Signed Certificate - Change RSA Public Key  &amp; Signature Algorithim</title>
      <link>https://community.cisco.com/t5/network-security/self-signed-certificate-change-rsa-public-key-signature/m-p/2581551#M920549</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My 1801 router (IOS 15x) is using the original self signed certificate (1024) with an signature algorithm MD5. I would like to change the cert to a 2048 key length , with a hash of SHA1 or better but I'm unsure how to do this.&lt;/P&gt;&lt;P&gt;Should I just generate new keys or would I be better creating a new self-signed cert?&amp;nbsp; What is the procedure &amp;amp; explicit commands (CLI) to do this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-signed-certificate-change-rsa-public-key-signature/m-p/2581551#M920549</guid>
      <dc:creator>ms4561</dc:creator>
      <dc:date>2020-02-21T13:20:03Z</dc:date>
    </item>
    <item>
      <title>Remove the old certificate</title>
      <link>https://community.cisco.com/t5/network-security/self-signed-certificate-change-rsa-public-key-signature/m-p/2581552#M920550</link>
      <description>&lt;P&gt;Remove the old certificate and RSA key.&lt;/P&gt;&lt;P&gt;Create a new RSA key with modulus 2048. Then a new certificate - it will use the new stronger private key you just created.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;no crypto pki trustpoint &amp;lt;existing certificate name&amp;gt;&lt;BR /&gt;crypto key zeroize rsa&lt;BR /&gt;crypto key generate rsa modulus 2048 label &amp;lt;name for new rsa key&amp;gt;&lt;BR /&gt;ip http secure-server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;(The last command will automatically generate a new self-signed certificate.)&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2014 15:52:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-signed-certificate-change-rsa-public-key-signature/m-p/2581552#M920550</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-11-20T15:52:58Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin Thank you for reply</title>
      <link>https://community.cisco.com/t5/network-security/self-signed-certificate-change-rsa-public-key-signature/m-p/2581553#M920551</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for reply. I would like to clarify one point, I use the cert for ssh connections to router &amp;amp; don't&amp;nbsp; want to enable secure-server (as I don't use this service) on the router. Is there another command to create a new certificate without enabling/disabling secure-server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2014 07:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-signed-certificate-change-rsa-public-key-signature/m-p/2581553#M920551</guid>
      <dc:creator>ms4561</dc:creator>
      <dc:date>2014-11-21T07:33:23Z</dc:date>
    </item>
    <item>
      <title>Sure, the secure-server is</title>
      <link>https://community.cisco.com/t5/network-security/self-signed-certificate-change-rsa-public-key-signature/m-p/2581554#M920552</link>
      <description>&lt;P&gt;Sure, the secure-server is the quickest and easiest method but you can create the new key, define the trustpoint manually and enroll the certificate that way.&lt;/P&gt;
&lt;P&gt;Below are the commands. (You can of course call the key, trustpoint, O&amp;nbsp;and CN values whatever locally significant names make&amp;nbsp;sense for you.)&lt;/P&gt;

&lt;PRE style="margin-top: 20px; margin-bottom: 20px; padding: 15px; font-size: 12px; font-family: 'Courier New', Courier, mono; line-height: 1.5em; color: rgb(0, 0, 0); overflow: auto; white-space: pre; border-style: dashed; border-color: rgb(204, 204, 204); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"&gt;
router(config)#crypto key generate rsa label router-rsa modulus 2048
The name for the keys will be: router-rsa

% The key modulus size is 2048 bits
% Generating 2048 bit RSA keys, keys will be non-exportable...
[OK] (elapsed time was 10 seconds)

router(config)#&lt;/PRE&gt;

&lt;PRE style="margin-top: 20px; margin-bottom: 20px; padding: 15px; font-size: 12px; font-family: 'Courier New', Courier, mono; line-height: 1.5em; color: rgb(0, 0, 0); overflow: auto; white-space: pre; border-style: dashed; border-color: rgb(204, 204, 204); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"&gt;
router(config)#crypto pki trustpoint router-ca
router(ca-trustpoint)#enrollment selfsigned
router(ca-trustpoint)#subject-name O=Test,CN=www.router.com
router(ca-trustpoint)#rsakeypair router-rsa&lt;/PRE&gt;

&lt;PRE style="margin-top: 20px; margin-bottom: 20px; padding: 15px; font-size: 12px; font-family: 'Courier New', Courier, mono; line-height: 1.5em; color: rgb(0, 0, 0); overflow: auto; white-space: pre; border-style: dashed; border-color: rgb(204, 204, 204); background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"&gt;
router(config)#crypto pki enroll router-ca
% Include the router serial number in the subject name? [yes/no]: no
% Include an IP address in the subject name? [no]: no
Generate Self Signed Router Certificate? [yes/no]: yes

Router Self Signed Certificate successfully created

router(config)#&lt;/PRE&gt;</description>
      <pubDate>Mon, 24 Nov 2014 13:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/self-signed-certificate-change-rsa-public-key-signature/m-p/2581554#M920552</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-11-24T13:47:06Z</dc:date>
    </item>
  </channel>
</rss>

